Skip to main content

Conspiracy Spoofing Orders Detection with Transformer-Based Deep Graph Learning

  • Conference paper
  • First Online:
Advanced Data Mining and Applications (ADMA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14177))

Included in the following conference series:

  • 480 Accesses

Abstract

Spoofing behaviors profits from other participants via placing large amounts of deceptive orders to create misleading signals with the help of advanced electronic trading techniques, severely harming the healthy and sustainable development of modern financial markets. Existing works focus mostly on detecting individual spoofing issuers or orders, which ignore the capability of mining hidden conspiracy fraud patterns. Consequently, they face significant challenges in tracking organized spoofing behaviors. To this end, in this paper, we proposed a novel transformer-based graph neural network to learn the temporal inter-connected transaction representations for conspiracy spoofing behavior detection. In particular, we model user orders in the financial market by the temporal transaction graph layer first, which produces temporal and relational encodings of the user’s order behaviors. Then, we devise a transformer-based neural network to automatically learn the deeper sequential and inter-connected representations, which could perceive a boarder view of the user’s transaction patterns. Finally, the temporal and relational features are jointly optimized by the detection network in an end-to-end manner. We conduct extensive experiments on a real-world dataset from one of the largest financial exchange markets in East Asia. The result strongly proves the superior performance of our proposed method in fighting against conspiracy spoofing behaviors with higher accuracy without handcraft feature engineering, compared with ten state-of-the-art baselines. To the best of our knowledge, this is the first work that proposed a transformer-based deep graph learning approach for spoofing detection challenges and demonstrates its practical ability in real-world applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.cftc.gov/PressRoom/PressReleases/8260-20.

References

  1. Arora, S., Bhatia, M.: Fingerprint spoofing detection to improve customer security in mobile financial applications using deep learning. AJSE, pp. 2847–2863 (2020)

    Google Scholar 

  2. Bkassiny, M., Li, Y., Jayaweera, S.K.: A survey on machine-learning techniques in cognitive radios. IEEE Commun. Surv. Tutorials, 1136–1159 (2012)

    Google Scholar 

  3. Cao, L.: Ai in finance: challenges, techniques, and opportunities. ACM Comput. Surv. (CSUR) 55(3), 1–38 (2022)

    Article  MathSciNet  Google Scholar 

  4. Cao, Y., Li, Y., Coleman, S., Belatreche, A., McGinnity, T.M.: Adaptive hidden Markov model with anomaly states for price manipulation detection. TNNLS, pp. 318–330 (2014)

    Google Scholar 

  5. Cartea, Á., Jaimungal, S., Wang, Y.: Spoofing and price manipulation in order-driven markets. Appl. Math. Finance 27(1–2), 67–98 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  6. Chen, J., Zhuang, F., Hong, X., Ao, X., Xie, X., He, Q.: Attention-driven factor model for explainable personalized recommendation. In: SIGIR, pp. 909–912 (2018)

    Google Scholar 

  7. Cheng, D., Niu, Z., Tu, Y., Zhang, L.: Prediction defaults for networked-guarantee loans. In: ICPR, pp. 361–366 (2018)

    Google Scholar 

  8. Cheng, D., Tu, Y., Ma, Z.W., Niu, Z., Zhang, L.: Risk assessment for networked-guarantee loans using high-order graph attention representation. In: IJCAI, pp. 5822–5828 (2019)

    Google Scholar 

  9. Cheng, D., Wang, X., Zhang, Y., Zhang, L.: Graph neural network for fraud detection via spatial-temporal attention. TKDE, pp. 1–13 (2020)

    Google Scholar 

  10. Ding, Q., Wu, S., Sun, H., Guo, J., Guo, J.: Hierarchical multi-scale gaussian transformer for stock movement prediction. In: IJCAI, pp. 4640–4646 (2020)

    Google Scholar 

  11. Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: CIKM, pp. 315–324 (2020)

    Google Scholar 

  12. Fu, K., Cheng, D., Tu, Y., Zhang, L.: Credit card fraud detection using convolutional neural networks. In: ICONIP, pp. 483–490 (2016)

    Google Scholar 

  13. Gong, J., Sun, S.: A new approach of stock price prediction based on logistic regression model. In: NISS, pp. 1366–1371 (2009)

    Google Scholar 

  14. Graves, A., Fernández, S., Schmidhuber, J.: Bidirectional lstm networks for improved phoneme classification and recognition. In: ICANN, pp. 799–804 (2005)

    Google Scholar 

  15. Heidari, A.A., Faris, H., Aljarah, I., Mirjalili, S.: An efficient hybrid multilayer perceptron neural network with grasshopper optimization. Soft Computing, pp. 7941–7958 (2019)

    Google Scholar 

  16. Hsu, C., Li, C.T.: Retagnn: Relational temporal attentive graph neural networks for holistic sequential recommendationn. In: WWW, pp. 2968–2979 (2021)

    Google Scholar 

  17. Khairy, R.S., Hussein, A., ALRikabi, H.S.: The detection of counterfeit banknotes using ensemble learning techniques of adaboost and voting. IJISAE, pp. 326–339 (2021)

    Google Scholar 

  18. Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. In: ICLR, pp. 1–15 (2015)

    Google Scholar 

  19. Leangarun, T., Tangamchit, P., Thajchayapong, S.: Stock price manipulation detection based on mathematical models. IJTEF, pp. 81–88 (2016)

    Google Scholar 

  20. Ma, Y., Wang, S., Aggarwal, C.C., Tang, J.: Graph convolutional networks with eigenpooling. In: KDD, pp. 723–731 (2019)

    Google Scholar 

  21. Mendonça, L., De Genaro, A.: Detection and analysis of occurrences of spoofing in the Brazilian capital market. J. Financial Regulation Compliance (2020)

    Google Scholar 

  22. Oghenerukevbe, E.A.: Customers perception of security indicators in online banking sites in Nigeria. J. Internet Banking Commerce 13(3), 1–14 (1970)

    Google Scholar 

  23. Olchyk, A.: A spoof of justice: double jeopardy implications for convictions of both spoofing and commodities fraud for the same transaction. Am. UL Rev. 65, 239 (2015)

    Google Scholar 

  24. Park, S.H., Han, K.: Methodologic guide for evaluating clinical performance and effect of artificial intelligence technology for medical diagnosis and prediction. Radiology, pp. 800–809 (2018)

    Google Scholar 

  25. Sadineni, P.K.: Detection of fraudulent transactions in credit card using machine learning algorithms. In: I-SMAC, pp. 659–660 (2020)

    Google Scholar 

  26. Scopino, G.: Preventing spoofing: From criminal prosecution to social norms. U. Cin. L. Rev., 1–8 (2016)

    Google Scholar 

  27. Sinrod, E.J., Reilly, W.P.: Cyber-crimes: A practical approach to the application of federal computer crime laws. Santa Clara Computer & High Tech. LJ 16, 177 (2000)

    Google Scholar 

  28. Tao, X., Day, A., Ling, L., Drapeau, S.: On detecting spoofing strategies in high-frequency trading. Quantitative Finance 22(8), 1405–1425 (2022)

    Article  MathSciNet  MATH  Google Scholar 

  29. Tezgider, M., Yildiz, B., Aydin, G.: Text classification using improved bidirectional transformer. Concurrency and Computation: Practice and Experience, pp. 1–12 (2021)

    Google Scholar 

  30. Tseng, V.S., Ying, J.C., Huang, C.W., Kao, Y., Chen, K.T.: Fraudetector: a graph-mining-based framework for fraudulent phone call detection. In: KDD, pp. 2157–2166 (2015)

    Google Scholar 

  31. Tuccella, J.N., Nadler, P., Şerban, O.: Protecting retail investors from order book spoofing using a gru-based detection model. arXiv preprint, pp. 1–13 (2021)

    Google Scholar 

  32. Vaswani, A., et al.: Attention is all you need. In: NIPS, pp. 5998–6008 (2017)

    Google Scholar 

  33. Wang, X., Wellman, M.P.: Spoofing the limit order book: an agent-based model. In: AAAI, pp. 651–659 (2017)

    Google Scholar 

  34. Yang, L., Ng, T.L.J., Smyth, B., Dong, R.: Html: Hierarchical transformer-based multi-task learning for volatility prediction. In: Proceedings of The Web Conference 2020, pp. 441–451 (2020)

    Google Scholar 

  35. Yang, S., Paddrik, M., Hayes, R., Todd, A., Kirilenko, A., Beling, P., Scherer, W.: Behavior based learning in identifying high frequency trading strategies. In: CIFEr, pp. 1–8 (2012)

    Google Scholar 

  36. You, J., Ying, R., Ren, X., Hamilton, W., Leskovec, J.: Graphrnn: generating realistic graphs with deep auto-regressive models. In: International Conference on Machine Learning. pp. 5708–5717. PMLR (2018)

    Google Scholar 

  37. Zhang, T., He, W., Zheng, H., Cui, Y., Song, H., Fu, S.: Satellite-based ground pm2. 5 estimation using a gradient boosting decision tree. Chemosphere 268, 1–45 (2021)

    Google Scholar 

  38. Zhang, W., Wu, C., Zhong, H., Li, Y., Wang, L.: Prediction of undrained shear strength using extreme gradient boosting and random forest based on bayesian optimization. Geoscience Frontiers, pp. 469–477 (2021)

    Google Scholar 

  39. Zhu, P., Cheng, D., Yang, F., Luo, Y., Qian, W., Zhou, A.: Zh-ner: Chinese named entity recognition with adversarial multi-task learning and self-attentions. In: DASFAA, pp. 603–611 (2021)

    Google Scholar 

  40. Zhu, Y., Xi, D., Song, B., Zhuang, F., Chen, S., Gu, X., He, Q.: Modeling users’ behavior sequences with hierarchical explainable network for cross-domain fraud detection. In: WWW, pp. 928–938 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Le Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kang, L., Mu, TJ., Ning, X. (2023). Conspiracy Spoofing Orders Detection with Transformer-Based Deep Graph Learning. In: Yang, X., et al. Advanced Data Mining and Applications. ADMA 2023. Lecture Notes in Computer Science(), vol 14177. Springer, Cham. https://doi.org/10.1007/978-3-031-46664-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-46664-9_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-46663-2

  • Online ISBN: 978-3-031-46664-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics